Results 41 to 50 of about 240,934 (135)
Arguing satisfaction of security requirements [PDF]
This chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the
Haley, Charles B. +3 more
core
Introduction to Security Onion [PDF]
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core
Asymptotic Methods for Asset Market Equilibrium Analysis [PDF]
General equilibrium analysis is difficult when asset markets are incomplete. We make the simplifying assumption that uncertainty is small and use bifurcation methods to compute Taylor series approximations for asset demand and asset market equilibrium. A
Kenneth L. Judd, Sy-Ming Guu
core
Hybrid cryptographic and AI frameworks for cheat detection in online games
The exponential growth of multiplayer gaming has led to the formation of an arms race between anticheat and cheat developers, which has been increasing in pace at an exponential rate, creating a need for the implementation of robust anti-cheat mechanisms
Sitanshu Kapur +4 more
doaj +1 more source
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
The Game of Credit: A High Stakes Game That Perpetuates the Racial Wealth Gap [PDF]
Everyone deserves the opportunity to build a financially secure future for themselves and their families. Access to equal opportunities is the cornerstone of America's core values and is also a necessity to growing a healthy economy.
Lindy Carrow
core
Building Wealth on the Foundation of Employment Portfolio Series [PDF]
[Excerpt] The vision of the U.S. Department of Labor (USDOL) is to advance the economic futures of workers, including those with disabilities. The unique mission of the Office of Disability Employment Policy (ODEP) within USDOL is to promote the ...
National Center on Workforce and Disability/Adult
core +1 more source
Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja
RESUMEN Este documento exhibe información sobre normas, estándares y metodologías, utilizados para la gestión de seguridad de un Data Center y Red LAN.
Carlos Jaramillo +5 more
doaj
The effect of short-selling of the aggregation of information in an experimental asset market [PDF]
We show by means of a laboratory experiment that the relaxation of short--selling constraints causes the price of both an overvalued and an undervalued asset to decrease.
Veiga, Helena, Vorsatz, Marc
core +1 more source

